I haven't performed the console mod yet. Do think this might provide some useful output?

I haven't performed the console mod yet. Do think this might provide some useful output?

Or should I just admit my stupidity and send the box back to buffalo for repair?

Or should I just admit my stupidity and send the box back to buffalo for repair?

+

+

== '''Terrastation Root password.''' ==

+

+

+

I have just installed the Terastation 2.03 firmware from http://homepage.ntlworld.com/itimpi/buffalo.htm

+

I currently have telnet access, and wish to install SSH, although I do not have root accesss. sudo does not work because there is no /etc/sudoers file, and I can't add anything to /etc/ due to my permissions.

+

Does anyone know the default root password for 2.03?

+

Thanks.

== '''Terrastation Root password.''' ==

== '''Terrastation Root password.''' ==

Revision as of 05:07, 6 April 2006

> bg and Sec hacked the password for the 1.05 firmware and were able to make, pack and apply ower own firmware image.

Great! What is the password?

And now what? Only a few paragraphs above you say:

> For the time being it's not possible to hack the TeraStation without adding a serial console first.

Scott by any means please post your kernel modules, as I was able to produce modules that allow me to mount an nfs export, but when I try to do any operation over them this mount gets stuck. And if you can, please include your .config with the modules.

Just downloaded European 2.00 firmware. Extracted, added Dropbear and NFS like described in this Wiki. The ~var symlink was not overwritten when extracted using the same tar command as suggested for Dropbear. Still, one could always extract with -w as well, do not extract the /var stuff, but extract it to another folder later on and move it manually. Re-compressed, installed new firmware. File system still there without problems. Only remaining problem:

admin@TERASTATION:/etc$ /etc/init.d/nfs-common start

/etc/init.d/nfs-common: modprobe: command not found

Starting NFS common utilities: statd/etc/init.d/nfs-common: start-stop-daemon: command not found

Therefore on client side:

[root@linuxbox ~]# mount 192.168.13.8:/mnt/array1 /mnt/terabackup/

mount to NFS server '192.168.13.8' failed.

Two additional comments:

after extracting the NFS stuff, etc/exports needs to be edited. The default exports only to 192.168.1.1, but you probably want to adjust it to export to either your box (change IP there) or your whole network (/mnt/array1 192.168.1.0/255.255.255.0(rw,root_squash) or similar).

You need to edit linkstation_version.txt to show a newer version number, otherwise you won't be able to upgrade.

Contents

installation

I tried this twice. After the first time, I had to reinitialize the drives in order to restore the file system so that I could boot. This, the second time, I poked around the file system a little more and realized untarring it, using tar xvzf all-nfsd.tar.gz, overwrote my /var directory. It was overwritten because I *think* it was a symlink to /mnt/ram/var [http:/ls-lR/1.04/ file list]. I can't be certain because I'm running 1.12, but recreating the link seems better - I see the expected stuff in /var (e.g. /var/log/messages). I have no idea if the
file system is normal because I haven't rebooted.

Anyone have any input? Is there a way for tar not to clobber that link?

I think individual problems and requests for help belong into the discussion part, not into the article! CCRDude 13:37, 13 Feb 2006 (CET)

Dead Terastation

In my over zealous hacking attempts, I have managed to kill the code in my flash. Is there a way to restore the flash code?

The TeraStation has a JTAG interface. It's part of the regular PowerPC debugging interface CN11. This 16pin interface is quite common for embedded PowerPCs, but I've forgotten it's name and don't have any useable links.

Unfortunately we don't have any JTAG-borderscan information, and without you will not be able to use the JTAG interface.

Sorry, but it looks like you're hossed. How did you destroy your flash anyway?

Come to think of it: unless you also destroyed the bootloader, you should be able to access it. Either from the serial port or even from the network. I've no further infrmation on this either.

You could ask buffalo, they have now at last learned how to use mdadm with a hacked firmware to recover a hossed raid.

It was actually kinda stupid. I have two TeraStations, a TeraStation 1T and a TeraStation Pro 1T.
I got the latest firmware for the Pro to add the AD support. I 'accidentally' applied the update to the non-pro box. After the TeraStation rebooted, it shutdown with the Diag light flashing.
According to TeraStation docs:

Five time continuous blinking(every four seconds)
Flash ROM Error

The box is no longer accessible from the net. I thought I may be able to find some info on the root disk so I put it in a USB enclosure and mounted it using Suse. Of course there was nothing I could do because the kernel doesn't appear to load/execute from the flash.
I haven't performed the console mod yet. Do think this might provide some useful output?
Or should I just admit my stupidity and send the box back to buffalo for repair?

Terrastation Root password.

I have just installed the Terastation 2.03 firmware from http://homepage.ntlworld.com/itimpi/buffalo.htm
I currently have telnet access, and wish to install SSH, although I do not have root accesss. sudo does not work because there is no /etc/sudoers file, and I can't add anything to /etc/ due to my permissions.
Does anyone know the default root password for 2.03?
Thanks.

Terrastation Root password.

I have just installed the Terastation 2.03 firmware from http://homepage.ntlworld.com/itimpi/buffalo.htm
I currently have telnet access, and wish to install SSH, although I do not have root accesss. sudo does not work because there is no /etc/sudoers file, and I can't add anything to /etc/ due to my permissions.
Does anyone know the default root password for 2.03?
Thanks.